Create an account


Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
AppleInsider - WhatsApp vulnerability left iOS open to spyware attack

#1
WhatsApp vulnerability left iOS open to spyware attack

<div style="margin: 5px 5% 10px 5%;"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2019/05/whatsapp-vulnerability-left-ios-open-to-spyware-attack.jpg" width="1" height="1" title="" alt="" /></div><div><p><!-- font size selector, BEGIN --> <span class="cfix">&nbsp;</span> </p>
<p class="gray small byline"> By <a href="https://appleinsider.com/cdn-cgi/l/email-protection#117c787a746872707c6173747d7d51767c70787d3f727e7c">Mikey Campbell</a> <br /><span class="gray">Monday, May 13, 2019, 07:07 pm PT (10:07 pm ET)</span> </p>
<p> <span><span class="article-leader">Facebook-owned WhatsApp on Monday disclosed the recent fix of a VoIP-related vulnerability that allowed nefarious parties to remotely install spyware on both iOS and Android handsets. <br /></span></p>
<div align="center">
<div class="article-img"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2019/05/whatsapp-vulnerability-left-ios-open-to-spyware-attack.jpg" alt="WhatsApp" height="387" class="lazy" data-original="http://www.sickgaming.net/blog/wp-content/uploads/2019/05/whatsapp-vulnerability-left-ios-open-to-spyware-attack-1.jpg"><img src="http://www.sickgaming.net/blog/wp-content/uploads/2019/05/whatsapp-vulnerability-left-ios-open-to-spyware-attack-1.jpg"></div>
<p><span class="minor2 small gray"></span></div>
<p>Discovered in early May, the <a href="https://www.facebook.com/security/advisories/cve-2019-3568">now-patched bug</a> in the app’s audio call feature allowed hackers to deliver a spyware payload to target devices, a process that worked even if the WhatsApp call recipient failed to answer. </p>
<p>It took WhatsApp <a href="https://techcrunch.com/2019/05/13/whatsapp-exploit-let-attackers-install-government-grade-spyware-on-phones/">less than ten days</a> to patch the security hole following its discovery, reports <em>TechCrunch</em>. How long the vulnerability existed without detection is unknown, but the company confirmed hackers took advantage of the window to install an unknown number of malicious payloads. </p>
<p>Although WhatsApp did not name a specific company or spyware variant associated with the security breach, a statement on the matter points to Israeli vendor NSO Group. </p>
<p>“This attack has all the hallmarks of a private company known to work with governments to deliver spyware that reportedly takes over the functions of mobile phone operating systems,” WhatsApp said. </p>
<p>NSO develops and markets a <a href="https://appleinsider.com/articles/18/09/20/nso-malware-accessed-executives-iphone-within-minutes">well-known and notoriously effective</a> piece of spyware called Pegasus. Typically reserved for government buyers, Pegasus is often used by law enforcement agencies to gain wide access to key device functions and data stores.</p>
<p>Apple has in the past <a href="https://appleinsider.com/articles/16/09/01/pegasus-ios-malware-package-also-found-to-impact-os-x-apple-issues-patch">attempted to patch</a> flaws in iOS and macOS leveraged by Pegasus, but NSO continues to uncover and exploit zero-day vulnerabilities in iOS to keep its product functional. </p>
<p>WhatsApp believes only a small number of users were impacted by attacks, noting only advanced and highly motivated actors would be capable of leveraging the bug, the report said. </p>
<p>The company alerted the U.S. Justice Department and various human rights organizations after discovering the vulnerability, and urges users to update their respective app versions to protect against future attacks. </p>
<p>“WhatsApp encourages people to upgrade to the latest version of our app, as well as keep their mobile operating system up to date, to protect against potential targeted exploits designed to compromise information stored on mobile devices,” WhatsApp said in a statement.</p>
<p></span> </p>
</div>
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Forum software by © MyBB Theme © iAndrew 2016